Doctor of Sci., Ph. D. Sokolova S. P., Ph. D. Gorkovenko E. V.

St. Petersburg State University of Aerospace Instrumentation

 

CLASSIFICATION SUBSYSTEM OF INFORMATION SECURITY WITH MANDATORY ACCESS CONTROL

 

Abstract. The paper considers a hierarchical structure, mathematical models and computing procedures of security objects classification of mandatory access differentiation to informational resources. It allows shaping tree-type structure of minimally bounding clusters of informational requests of users with subject to information confidence. The efficiency of the proposed subsystem is demonstrated on the example of the multilevel delimitation access to thematic information resources in the satellite information-telecommunication system in the Republic of Kazakhstan.

 

Key words: Classification, mandatory access control, immunocomputing and PCA, confidence, multilevel delimitation access

 

 

1 Introduction

 

Politics of Information Security of information systems with confidential information has been settled on the mandate access control. It is contained in demarcation of rights of access subjects to objects on the base official permission for reference to the information of appropriate level confidentiality [1].

Mandatory access control is consisted in the differentiation of access rights subjects to objects based on the formal authorization (right of access) of subjects to access information of such confidentiality level. Mandatory access control includes mechanisms of access differentiation to information. These mechanisms are divided into procedures realizing the rules of access to information (reading, writing, addition, etc.), and the procedures for the management rights (ownership, create, delete, etc.).

As it is known, significant numbers of models for ensure the security of information resources has been developed. The most common models are:

·        discretionary access control based on the rules which is defined by specific discretionary model [2]. For the forming of the access matrix can be used of Harrison, Rizzo and Ullman models or Take Grant model;

·        mandatory access control [2]. It classical model of the Bell-LaPadula formally written in terms of the theory of relations. The orderliness between subjects and objects is taken into account in accordance with their level of security. The system status varies according to their transformation rules.

However, despite all the advantages of the Bell-LaPadula model, with its use raises a number of technical difficulties. This a definition of remote reading status, the definition of access rights authorized object of type "administrator"; unauthorized "declassification" of a object protection with a decrease in the degree of secrecy of information, etc.

For efficient and secure access to information resources has developed the system of mandatory differentiation access to information [3, 4] with the maintenance of its database of multilevel security [5]. Full specifications of subjects and objects of protection and access rules are stored in this database. This system contains the following subsystems: mandate access differentiation to information which has realized as processing database queries monitor; intelligent information security monitoring with mandate access control [6]. The subsystem provides multilevel protection against unauthorized access based on the following access rule:

• the subject is not allowed to receive or record information from the subject or object with a higher level of protection;

• the subject is not allowed to receive information from an object that has no access right for current inquiry.

The main elements of the mathematical model  are: subjects set ; objects set ; security clearances set ; set of access aspects and control them ; access rights matrix ; list of current access ; list of queries .

The object holder – is subject which it has originated. He can pass to other subjects the rights on this object access. Using this holder concept each object is associated with holder (unique user), having the access control authority to the object. The holder fully controls of producing object and can’t pass the control authority to other subject. But he may vary the access control allowing to let or interdict the access other subjects. Such policy responds to multilevel access control requirements and security system administrator affects it.

The referencing process to access rights matrix  as to the core of multilevel security system is jointed with execution such procedures:

·        definition of conditions and access types to the data of different security degree;

·        definition of control rights of access law;

·        analysis of filling matrix  with accounting of execution the main access rule;

·        implementation of domain and creation rights according hierarchy of security subjects and objects;

·        control of execution the present-day query according the main access rule;

·        safeguard of matrix  from the efforts of unauthorized modification.

Intelligent information security monitoring subsystem has been intended for decision the next tasks: authentication of security subjects; classification and clustering of the security objects; analysis of the properties of demarcation of access rights matrix. It contains the next modules: learning and self-learning, pattern recognition, generation risk index, interpretation of the results. Mathematical models and calculation procedures of Immunocomputing and PCA have been realized in the above-listed modules [6, 7, 8].

This system has been constructed so that no one user received the possibility to refer to the information initially belonging to the owner with higher security clearance during all time of its operation. If there is the effort of unauthorized access to informational resource it responses on unauthorized users, violation of the main access rules and conditions of check access.

Development of methodology for the formation and correct classification of a protection objects in the system with the mandatory differentiation access to information of varying degrees of confidentiality allows, first, to fully implement the analysis of the model in access control for correctness and completeness, secondly, to realize a complete multilevel security system.

Object access for operating systems was suggested with the positions of mandatory differentiation access [1, 2], for modern RDBMS [9]. The systems with mandatory policy of information security were developed [10, 11]. They allowed realizing the mandate access engine with three-level hierarchy of access object: data base, table in the data base, data record in table. In the both cases access objects was invested with only one qualitative index– confidentiality degree. The approach of step-by-step classification informational matter was suggested for construction of the object access tree. Their hierarchy levels reflect the interrelation security subject having the status of objects security owners.

Tree structure representation of security objects is implemented through a hierarchy of possession rights of subjects by objects. The hierarchical dependence between security objects is manifested through the hierarchy of security degrees of information and through the hierarchy of the classification of subjects to object. Trunk of a tree of objects is building on degrees access to information of entities that own objects. The connections between objects are defined depending on the secrecy of information. The ramification of solutions occurs through the creation of new facilities owners as a result “the creation of the sons” of the object.

On each tree hierarchy level there is a need to classifying the security objects in detail on the following four categories:

- security degree information which contains or passes in the security object;

- presentation information type attached to a storage in the data base or announcements transfer on communications channels;

- coincidence call indicator to the information by way of active or inactive component of the security system;

- status of information presentation in the security object.

When forming a hierarchical set of objects security was used the methods of clustering information. This made it possible to pick out all the security objects by executing of proposed procedures of classification. The authorized access to which ensures the required class of informational security in computing system and gratification of non redundancy of meta specifications and non contradictoriness of information resources.

Analysis procedure of informational matters, a deselect access objects and subjects and their classification enables the following stages (Figure 1):

- generation of the security access requirements to informational resources of different degree confidentiality;

- execution of computational classification procedures of informational users queries taking into account informational commonality; degree confidentiality and clustering index;

- generation of metadata base of security specifications and database of the multilevel security.

 

 

Fig. 1. Hierarchical classification procedures structure of the information security objects

 

The mathematical apparatus of the implementation of each listed procedures will be examined.

 

2. Mathematical models and computational classification procedures of the informational queries of the users

 

The strategy of information protection is created based on an analysis of requirements to ensure privacy of data domain users, their credentials, information about the types of data sets and procedures for processing. It represents a means of establishing the eligibility of each user action with respect to all types groups of data.

Mathematical model of enterprise is interpreted as:

,

(1)

where  ‑ functions set, are subject to the automation;  ‑ set of manipulation data tasks;  ‑ database users set;  ‑ automation and control objects set;   input data of manipulation data tasks set;  ‑ output data of manipulation data tasks set;  ‑ all informational items of the enterprise set (exhaustive set);  ‑ relations between the enterprise components set.

Formed requirements of secure access to information of varying degrees of confidentiality allow presenting a mathematical model of multilevel governance and access control in the form:

,

(2)

where collections sets:  ‑ security subjects;  ‑ security objects; JZ ‑ security clearances;  ‑ sorts of the access and control them; M ‑ authorization matrix;  ‑ queries list.

For assurance of separated interface between the different categories of users and realization of rules and conditions for multilevel security it is necessary to define the hierarchical dependence inside the set of subjects and objects of protection subject to the various types of information processing and storage, of remote and local queries, and the specific subject area, which is characterized by sets of degrees of secrecy, security clearance, etc.

The hierarchical relations in the interior of subject sets and security objects will be defined for different types of information processing and with subject to distant and local inquiries.

Below the procedure of construction of stem tree for the security objects is presented Let ,  è ,  ‑ accordingly, set of all structural elements of the enterprise and set of structural informational element (IE), subject to security. Information request  user  () presents the collection of structured elements EP , moreover  ‑ set of all informational requests (IR) of the users with different access types to informational resources data base (DB). For every structured element EP user is determined security

degree , where  ‑ the set of security degrees of informational security BD. The security degree (confidence) is installed by the person, responsible for security data on the base of the importance degree analysis. For each users  on each request  is indicated  for structural elements and is fixed in . The authority level of BD user is maximal security level of the informational BD resource, to which user is letted the access.  ‑ set of the authority levels of BD users.

For certain  user obtains , where  forms section of the user  and is logged â in the authority matrix  for each user .  ‑ set, presenting EP for  user;  ‑ informational structural items quantity in the set. The community analysis establishes on the estimation of the similarity functions EP. If  ‑ II set of EP user, then  will be exhaustive set of II all users, forming by the way combination II each , minus recurring elements. Let ,  ‑ unified set of the informational elements. It includes all sets , . Let set . If the set  is non empty, à intersection capacity satisfies given (threshold) size and then EP  user has sufficient community degree with the EP remaining users [5, 12]. It allows ganging II of users EP in one cluster. Similarity measure is calculated as normalized similarity factor:

,

(3)

where  ‑ common elements quantity in  è ;  ‑ present elements quantity in , but missing in ;  ‑ present elements quantity in , but missing in.

The threshold level of the informational community between EP’s users  is picked from the interval 0,10,9. Here it is kept in mind of the informational changing specific character and type control system. Then the informational compositions of EP’s users, satisfying the proportion , is taken to alone class, which is maximum bound of the informational community users class. The hold and processing of collective informational resources is rationally for this class. If not then users is taken to the loosely bound class. It is necessary the designing of separated files for this class.

The clusters forming, minimally and maximum bounding between itself is starting from a selection in pairs collation sets of the different users informational elements. The community degrees  set  and all remaining sets  calculate (here  ‑ the first set number,  ‑ the second set number in the pair of collation sets), and pick the maximum: . If , then sets  and  is ganged: , forming a new set INT(tt) with a concatenated data set, where tt – integrated cluster number. For users requests  structured II are organized in LOK(t), where t – local cluster number. The integrated immunity indexes are calculated in the local and integrated clusters:

  .

Authority matrix  is analyzed for each cluster for the purpose of the isolation of clustered elements . These elements generate tree shaft of the security objects. The hierarchy is rated according access degrees of users  to information .

These procedures allow shaping the hierarchical structure clusters minimally bounding among it with accounting confidence information. As a result the clusters shape the tree shaft of the security objects.

The efficiency of the proposed subsystem is demonstrated on the example of the multilevel delimitation access to thematic information resources in the satellite information-telecommunication system in the Republic of Kazakhstan.

 

3. Classification problem on the set of informational security objects in the corporative net of cosmic infrastructure

 

The discipline of informational security of the corporative net of cosmic infrastructure provides the information security by means of instantiation multilevel access control to BD, cryptographic protection of confidential information, verification integrity transmitted traffics and the assurance of authorization users [13, 15]. The thematic informational outputs are storing, keeping and handing to the interested organizations.

Below the solution of classification problem is demonstrated on the example of EP fragment «Remote sensing». It intends for the control of access differentiation system in corporative net of cosmic infrastructure. The analysis of objective realm for 6 users was allowed to isolate 11 typical II (Table 1) – set  è 44 informational structured elements (IE) (Table 2) – set . Initial data and compositions of each informational requirement  in the formal aspect are shown on diagram 1 (Figure 2).

Analyses task of the informational community of isolated requests is solving at  and is receiving four clusters (Diagram 2):

Cluster1=LOK(1)= «P5»; Cluster2=LOK(2)= «P8»;

Cluster3= INT(1) =«P1, P7, P9, P10, P11, P6»; Cluster4=INT(2)=« P2, P3, P4».

 

Table 1. List of informational previewing elements «Remote sensing»

 

Identification

Designation informational requirement

 

To give attribute, labeling environmental region situation on present-day moment with indication variations from standard.

To give information about meteorological region situation with indication of cloudiness, humidity, transparency characteristics.

To give cartographical data of the surface territory observation, where practical fossil are conducted.

To collect information about meteorological situation on winning practical designs objects.

To collect information about status of mineral wealth design with indication of course squares troubles mineral wealth.

To collect information about state of emergencies (SE) of the natural and man-caused character in a region on the present situation.

To give information about amazed territories with environmental security troubles on the regions on the present situation.

To give information about SE and man-caused character catastrophes on the present situation with indication geographical location.

To give the troubles of the environmental security (toxin emissions, wood fires, oil spill, water body shoaling and etc.) all over the republic territory.

To give living population in the stations, exposing to natural catastrophe (earthquake, pest insect invasion and so on) on the territory of concrete region with territory of coverage refinement and periodic time.

To give information on SE of natural character, taking place near concrete populated built-up areas in â prescribed temporal period.

 

Table 2. List of informational previewing elements «Remote sensing»

 

Code IE

Title IE

Code IE

Title IE

d1

Region

d23

State of emergency (SE) of the man-caused nature (MCN)

d2

Region title

d24

Title of SE MCN

d3

Code region

d25

Level code of SE MCN

d4

Current ecological situation

d26

SE of the natural character

d5

Date, time

d27

Title of SE of the natural character

d6

Attribute ecological situation index

d28

Clump code of SE of the natural character

d7

Violation ecological security index

d29

Risk grade

d8

Name index

d30

Scope territory

d9

Percent difference tetrahedral standard

d31

Object floor area

d10

Meteorological situation

d32

Object amazed square

d 11

Cloudiness state

d33

Geographical situation

d12

Transparency state

d34

Geographic latitude

d13

Humidity state

d35

Longitude

d14

Mineral product (MP)

d36

Built-up area

d15

Array code MP

d37

Built-up area name

d16

Name MP

d38

population, living in a built-up area

d17

Meteorological situation on the crop and refinement MP objects

d39

Title of a neighboring administration of a fast response on SE

d18

Proprietor type of the crop object MP

d40

Telephone of the attorney on SE

d19

Name crop object MP

d41

Tighten force amount of a fast response near a built-up area

d20

MP indices

d42

People amount for mobilization in a built-up area

d21

Plan course square

d43

Title of contiguous area

d22

Real course square

d44

Amazed square of contiguous area

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Local clusters contain user requirements, which are independent of other information. Each integrated cluster includes information requirements, among which the level of community more than the given critical level.

For each cluster is calculating the integrated index of IE security degree applying security matrix :

;

As the analyses result Cluster3 is fractured on Cluster3-1and Cluster3-2 (Diagram 3):

Cluster3-1 = INT(1.1) =«P1, P6, P7, P9»; Cluster3-2 = INT(1.2) =«P10, P11».

In the structural set IE is isolated the group IE (Table.3): . For all group elements, which may contain confidential information it is necessary to determine the access rules, because they will be subject to protection. There are several security objects (SO) (Table 4).

 

Table 3. Subset of group structural informational elements (IE)

 

GIE

Name of group IE

d1

Region

d4

Present-day situation

d7

Indicator of environmental security disturbance

d10

Meteorological situation

d14

Mineral products (MP)

d17

Meteorological situation on íà objects crop and refinement (MP)

d20

MP indices

d23

State of emergency (SE) of a man-caused nature

d26

State of emergency of a naturally character

d30

Territory of a scope

d33

Geographical location

d36

Built-up area

 

 

 

 

 

Table 4. Set of security objects (SO)

 

Description

SÎ

Name SÎ

Classification parameters of security objects

Discipline type

Status of primary presentation 

Attribute of simultaneity reference to information

Î1

Remote sensing

Directoire

Compound representation

Library passive component

Î2

Information about meteorological situation

File

Secondary representation

Document passive component

Î3

Information about present-day environmental situation

File

Compound

Document passive component

Î4

Information about state MP

File

Original representation

Document passive component

Î5

Information about environmental security disturbance

File

Original representation

Document passive component

 

Tree structure representation of objects of protection is implemented through a hierarchy of rights of ownership of objects and subjects and the status of the subjects in the administrative and management structure (Figure 3). A classification of all selected elements of group for each local and integrated segment is effected . Then for all objects of protection , which are the main directories on the "trunk", are defined the group elements with a value type object "document" or "program".

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Each object of protection type "directory" is placed in the functional dependence of the list of other types of objects of protection. This takes into account [9]:

-specific object of protection is only a passive component (= "0"), or may be both passive and active components (= "1");

- a status of specific object of protection is the primary carrier of information (= "1"), or generated by the storage medium (= "2"), or a secondary storage medium (= "3");

- a type of specific object  may be a director, document, program, message.

Tree «branches» of security objects are presented on the Figure 4.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


4. Conclusion

 

 

4. Conclusion

 

Suggested hierarchical structure, mathematical models and computing procedures of security objects classification with mandatory access to informational resources allows to solve real-world problems. They were allowed to shape the tree-type structure of minimally bounding clusters of informational requests of users with subject to confidence of information. The tree structure of protection objects gives the best picture of the access control, because take into account the features of procedures with limited information use.

 

REFERENCES:

 

1

Scheglov A.Yu. Security of the computer information from the unauthorized access. St. Petersburg: Science and Technique, 2004. 384 p. (rus.)

 

2

Leonard J LaPadula and D. Elliott Bell “Secure Computer Systems: A Mathematical Model”, MITRE Corporation Technical Report 2547, Volume II, 31 May 1973.

 

3

Sokolova S.P., Gorkovenko E.V. Protection of access rights in the system with mandate policy of information security. SPIIRAS Proceedings, issue 7, Editor – R.M. Yusupov, Corr. Member of the RAS. St. Petersburg: Nauka, 2008. ‑ PP. 143 – 151. (rus.)

 

4

Gorkovenko E. V. Multilevel security data base as the fundamental element of security information technique of the different security degree //Proceeding ÕIV International conference «Complex information security - 2009». Minsk: RBJ, 2009, (rus.).

 

5

Gorkovenko E. V. Management of data base and computing nets. //Science issue, Almaty: «Fylyì», 2005, pp. 56 ‑ 80. (rus.)

 

6

Sokolova S.P., Gorkovenko E.V. Intelligent monitoring subsystem of information security with mandatory access control. Thesis of the Seventh Winter Symposium on Chemometrics "Modern Methods of Data Analysis". St. Petersburg, 2010. PP.77 ‑ 78, http://www.wsc.chemometrics.ru/wsc7.

 

7

Tarakanov A.O., Skormin V.A., Sokolova S.P. Immunocomputing: Principles and Applications., N.Y.: Springer. 2003. 193 ð.

 

8

Sokolova S.P. and etc. Intelligent analysis of multilevel data by immunocomputing. Almaty: IPIC, 2006, 110 p. (rus.)

 

9

Basan A.S. Security object classification by supporting of mandated access differentiation in SCBD // Proceeding of VIII International science-practical conference "Informational security". Taganrog: TRTU, 2006. PP.128 ‑ 130. (rus.)

 

10

Tishkov A.V., Kotenko I.V., Sidil’nokov E.V., Chervatjuk O.V. Detection and resolution of conflicts in security policies. //Proceeding of the second international conference on problems of security and counter terrorism. M.: MCSMS, 2006. PP. 172 ‑ 185.

 

11

Stepashkin M.V., Kotenko I.V., Bogdanov V.S. Intelligent system of vulnerability analysis of computer networks. // Proceeding of X national conference on the artificial intelligent. V. 1. M.: Fizmatlit., 2006. PP. 149 ‑ 157.

 

12

Kulba V.V., Kovalevskiy S.S., Kosiachenko S.À., Sirotjuk V.O. Theoretical bases of the optimal architecture designing of distributed data base. M.: IPC RAS, 1999. PP.107-113. (rus.)

 

13

Gorkovenko E. V. Informational security administration in the corporate net of the cosmic infrastructure.//Bulletin of national engineering academy of the Republic Kazakhstan, ¹1 (23) Almaty: 2007, PP. 60 ‑ 65. (rus.)

 

14

Gorkovenko E. V. The generation of subjects and objects security nets for multilevel model of access differentiation //KazNU Bulletin, ¹ 3(50), Almaty: 2006. PP. 104 ‑ 110. (rus.)

 

15

Gorkovenko E. V. Securing thematic information resources on the corporate network infrastructure space. //Proceedings of ÕII International science-practical conference «Reshetnevskiya chteniya». Krasnoyarsk: SSAI, 2008. PP. 396399. (rus.)

 

16

Gorkovenko E. V. Multilevel access control in corporate networks of space infrastructure. //Mathematical magazine, V. 7, ¹3 (25). Almaty: IM MES RK, 2007. PP. 28 ‑ 34. (rus.)